APP: Losant Arduino MQTT Client Stack Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Losant Arduino MQTT Client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the current process.

Extended Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Losant Arduino MQTT Client prior to V2.7. User interaction is not required to exploit this vulnerability. The specific flaw exists within the parsing of MQTT PUBLISH packets. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6436.

Affected Products

Losant arduino_mqtt_client

References

CVE: CVE-2018-17614

Short Name
APP:MISC:LOSANT-ARD-MQTT-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Arduino Buffer CVE-2018-17614 Client Losant MQTT Overflow Stack
Release Date
08/10/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3623
Port
TCP/1883
False Positive
Unknown
Vendors

Losant

Found a potential security threat?